Skip to main content
. 2017 Apr 18;16:14. doi: 10.1186/s12942-017-0087-7

Fig. 5.

Fig. 5

Schematic of the database construction methodology

HHS Vulnerability Disclosure